Novel order preserving encryption scheme for wireless sensor networks

An Order-Preserving Encryption (OPE) scheme is a deterministic cipher scheme, whose encryption algorithm produces cipher texts that preserve the numerical ordering of the plain-texts. It is based on strictly increasing functions. It is a kind of homomorphic encryption where the homomorphic operation is order comparison. This means that comparing encrypted data provides the exact result than comparing the original data. It is attractive to be used in databases, especially in cloud ones as a method to enhance security, since it allows applications to perform order queries over encrypted data efficiently (without the need of decrypting the data). Wireless sensor network is another potential domain in which order preserving encryption can be adopted and used with high impact. It can be integrated with secure data aggregation protocols that use comparison operations to aggregate data (MAX, MIN, etc.) in a way that no decryption is being performed on the sensor nodes, which means directly less power consumption. In this paper, we will review many existing order-preserving encryption schemes with their related brief explanation, efficiency level, and security. Then, and based on the comparative table generated, we will propose a novel order-preserving encryption scheme that has a good efficiency level and less complexity, in order to be used in a wireless sensor network with an enhanced level of security.

[1]  Sehun Kim,et al.  Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases , 2009, IEICE Trans. Inf. Syst..

[2]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[3]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[4]  Nickolai Zeldovich,et al.  An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.

[5]  Nathan Chenette,et al.  Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.

[6]  Martin E. Dyer,et al.  Order-Preserving Encryption Using Approximate Integer Common Divisors , 2017, DPM/CBT@ESORICS.

[7]  Dongxi Liu,et al.  Programmable Order-Preserving Secure Index for Encrypted Database Query , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[8]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[9]  Divyakant Agrawal,et al.  Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[10]  Hiroyuki Kitagawa,et al.  A Secure and Efficient Order Preserving Encryption Scheme for Relational Databases , 2010, KMIS.

[11]  Dongxi Liu,et al.  Nonlinear order preserving index for encrypted database query in service cloud environments , 2013, Concurr. Comput. Pract. Exp..

[12]  Jyoteesh Malhotra,et al.  Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .

[13]  Ilsun You,et al.  New order preserving encryption model for outsourced databases in cloud environments , 2016, J. Netw. Comput. Appl..

[14]  YangJun,et al.  New order preserving encryption model for outsourced databases in cloud environments , 2016 .

[15]  Jianfeng Ma,et al.  hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts , 2017, Science China Information Sciences.

[16]  Christophe Guyeux,et al.  Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance , 2017, 2017 Sensors Networks Smart and Emerging Technologies (SENSET).

[17]  Sung Je Hong,et al.  Order-Preserving Encryption for Non-uniformly Distributed Plaintexts , 2011, WISA.

[18]  Jacques M. Bahi,et al.  Two security layers for hierarchical data aggregation in sensor networks , 2014, Int. J. Auton. Adapt. Commun. Syst..

[19]  Hiroyuki Kitagawa,et al.  MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values , 2010, IEICE Trans. Inf. Syst..

[20]  Vladimir Kolesnikov,et al.  On the limits of privacy provided by order-preserving encryption , 2012, Bell Labs Technical Journal.

[21]  Weiming Zhang,et al.  Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Jacques M. Bahi,et al.  A Complete Security Framework for Wireless Sensor Networks: Theory and Practice , 2015, Int. J. Inf. Technol. Web Eng..

[23]  Minkyu Kim,et al.  Comment on the Security of an Order-Preserving Encryption Scheme Using Pseudo-Random Function , 2016, IEICE Trans. Commun..